The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Coding schemes for multimedia fingerprinting in the presence of noise and colluders are investigated. We prove that best such codes have nonvanishing rate, i.e., have exponentially many codewords (users) and can trace the entire coalition of pirates and do it either with zero error probability or w.h.p. depending on the corresponding model of errors.
Multimedia phylogeny is a research field that aims at tracing back past history of multimedia documents to discover their ancestral relationships. As an example, it might leverage, with the aid of other side information, forensic analysts to detect who was the first user that published online an illegal content (e.g., child pornography). Although relatively well developed for images, this field is...
The existing reversible data hiding (RDH) methods often use a fixed pixel preselection pattern and predictor to generate prediction errors that are then utilized for embedding secret data. According to Kerckhoffs's principle, this deterministic operation may allow an illegal decoder to successfully reconstruct the marked prediction-error histogram from a marked image, which is not desirable in application...
The Android operating system changed its security- and privacy-related permission model recently, offering its users the ability to control resources that applications are allowed to access on their devices. This major change to the traditional coarse-grained permission system was anticipated for a long time by privacy-aware users. This paper presents the first study that analyzes Android users' adaptation...
While it is commonly known that successful forensic detectors should combine clues from various forensic features, unsupervised multi-modal tampering localization is still an open problem. State-of-the-art fusion methods perform simple pixel-wise combination of the input tampering maps. In this study, we show that pixel-wise combination is sub-optimal and successful fusion needs to model dependencies...
The increasing advance of Cloud-based solutions brings about serious privacy problems when outsourcing images for their processing in untrusted environments. One of the fundamental privacy-aware image manipulations that can be outsourced is denoising, an ubiquitous signal processing primitive with a broad set of applications. Traditional Signal Processing in the Encrypted Domain solutions cannot efficiently...
This paper highlights the challenges faced due to non-availability of trusted specialized forensic tools for conducting investigation on gaming consoles. We have developed a framework to examine existing state-of-the-art forensic acquisition and analysis tools by exploring their applicability to eighth generation gaming consoles such as the Xbox One and PlayStation 4. The framework is used to validate...
In the framework of minimizing embedding distortion steganography, the definition of cost function almost determines the security of the method. Generally speaking, texture areas would be assigned low cost, while smooth areas with high cost. However, the prior methods are still not precise enough to capture image details. In this paper, we present a novel scheme of defining cost function for adaptive...
The need of reliable authentication and forensic analysis tools for multimedia contents has recently led to the investigation of phylogenetic analysis strategies for near-duplicate (ND) images, i.e., pictures generated from a common one through processing operations. As an example, it is possible to detect which image within a group has been used to generate the others. Unfortunately, the accuracy...
A fingerprint recognition system is vulnerable to spoof attacks, where a fake fingerprint is used to circumvent the system. To counter such attacks, an automated spoof detector is used to distinguish images of fake fingerprints from those of real live fingerprints. Most spoof detectors adopt a machine learning approach, where a classifier is trained to distinguish between “spoof” and “live” samples...
Median filtering is one of the most popular image anti-forensic technique. Due to its nonlinearity, median filtering effectively hides traces of different types of image manipulation and therefore is integrated into several Anti-Forensic algorithms. As a result, the detection of median filtering has become of great significance for forensic analysis. To this end, several median filtering detectors...
Brainprint biometrics, as an emerging biometric technology, have recently gained increasing attention based on the assumption that each individual has unique memory and knowledge that are capable of providing distinctness from others. Like all other biometric methods, adversaries can also circumvent and compromise brainprint biometric systems, for example, by incorporating small-scale noises into...
In this paper, we propose a camera model identification method based on deep convolutional neural networks (CNNs). Unlike traditional methods, CNNs can automatically and simultaneously extract features and learn to classify during the learning process. A layer of preprocessing is added to the CNN model, and consists of a high pass filter which is applied to the input image. Before feeding the CNN,...
This paper proposes a new steganographic scheme relying on the principle of “cover-source switching”, the key idea being that the embedding should switch from one cover-source to another. The proposed implementation, called Natural Steganography considers the sensor noise naturally present in the raw images and uses the principle that, by the addition of a specific noise the steganographic embedding...
Automatic kinship verification from faces aims to determine whether two persons have a biological kin relation or not by comparing their facial attributes. This is a challenging research problem that has recently received lots of attention from the research community. However, most of the proposed methods have mainly focused on analyzing only the luminance (i.e. gray-scale) of the face images, hence...
Keystroke dynamics is an effective behavioral biometrics for user authentication at a computer terminal. Continuous or active authentication using keystroke dynamics has raised a lot of interest among researchers. However, there are only a few public datasets available for the research community compared to other biometric modalities primarily because of the difficulty of large scale data collection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.